وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Certified Information System Auditor Course – (CISA) 2024

سرفصل های دوره

1. CISA Training Introduction
  • 1. CISA Training Introduction

  • 2. CISA Domain 1 - The Information System Auditing Proces
  • 1. Information System Auditing Overview
  • 2. Types of Auditing
  • 3. ISACAs code of professional ethics
  • 4. ISACAs IT Assurance Framework
  • 5. Policy, Standard, Procedure, Guideline
  • 6. Audit Planning
  • 7. CIA Triad and Understand Security Basic terminologies
  • 8. Conducting IS Audit
  • 9. Audit Reporting
  • 10. Audit Risk
  • 11. Sampling Methodology
  • 12. Control Self Assessment
  • 13. CAATs and Continues Auditing technique
  • 14. Technology challenges and emerging technologies
  • 15. CISA Practice Questions - Domain 1 - 1
  • 16. CISA Practice Questions - Domain 1 - 2
  • 17. CISA Practice Questions - Domain 1 - 3

  • 3. CISA Domain 2 - Governance and Management of IT
  • 1. Domain 2 Introduction
  • 2. Governance of IT
  • 3. Goals and Objective of Governance
  • 4. Governance Frameworks
  • 5. Critical Success Factors for effective Governance
  • 6. Policies
  • 7. Standards, Procedures and Guidelines
  • 8. IT Integration with Business
  • 9. What is Risk Management
  • 10. Security Controls
  • 11. Business Case
  • 12. IT Organization
  • 13. Portfolio Management and Return on Investment
  • 14. Outsourcing and Third Party Risk Management - TPRM
  • 15. IT Performance Management and KPI and Balanced Score Card
  • 16. IT Balanced Score Card and Business Model for Information Systems
  • 17. Maturity Assessment Model
  • 18. Change Management of IT
  • 19. Quality Control and Assurance
  • 20. Impact of Lack of Governance of IT
  • 21. Legal and Regulatory Standards

  • 4. CISA Domain 3 - Information System Development and Maintenance and Acquisition
  • 1. Domain 3 Introduction
  • 2. Business Case and feasibility analysis and RFP Process
  • 3. Auditors role in reviewing Business case and feasibility analysis
  • 4. Project Steps and Project Management Organization
  • 5. Project vs Program
  • 6. Software Project Cost Estimation Tools
  • 7. Project Scheduling and Management Tools
  • 8. Post Project Activities and IS Auditor role in Project Review
  • 9. Software Development Methodologies
  • 10. Software Engineering Terminologies
  • 11. IS Auditor roles in Software Projects
  • 12. Software Testing
  • 13. Software Implementation and Rollover
  • 14. Software Accreditation and Post-Implementation Activities
  • 15. Application Controls
  • 16. Virtualization
  • 17. Containers

  • 5. CISA Domain 4 - Information System Operations and Resiliency
  • 1. Domain 4 Introduction
  • 2. IT Asset Management.html
  • 3. Managing Source Code.html
  • 4. Auditing Enterprise Architecture and End user computing.html
  • 5. Release Management Process.html
  • 6. Incident Management
  • 7. Database Overview
  • 8. IT Network Overview
  • 9. IT Network Overview - Part 2
  • 10. Cloud computing and virtualization overview
  • 11. Auditing Systems
  • 12. Application and Network Resiliency
  • 13. Backup types and media and concerns
  • 14. Business Continuity Planning and Disaster Recovery Planning
  • 15. Recovery time and Point Objectives
  • 16. Recovery Strategies
  • 17. Data Backup

  • 6. CISA Domain 5 - Protection of Information Assets
  • 1. Information Security vs Cybersecurity
  • 2. Security and Privacy
  • 3. What we are trying to secure
  • 4. What is the security vulnerability and how it can be used
  • 5. Threat Actors
  • 6. Malware Overview
  • 7. Cyber Attacks Overview
  • 8. Web Application Attacks
  • 9. Ethical Hacking quick overview
  • 10. Cyber Security frameworks
  • 11. Social Engineering
  • 12. Physical Security Part 1
  • 13. Physical Security Part 2
  • 14. AAA Overview
  • 15. Authentication - a deeper look
  • 16. MFA and Securing biometric authentication from attacks.html
  • 17. Authorization and Accounting - SIEM and SSO.html
  • 18. Network Security controls and services - Part 1.html
  • 19. Network Security controls and services - Part 2.html
  • 20. Cryptography overview.html
  • 21. Symmetric Encryption overview.html
  • 22. Asymmetric Encryption overview.html
  • 23. Public Key Infrastructure overview.html
  • 24. Hashing and Digital Signature.html
  • 25. Application of Encryption
  • 26. Software Implementation and Rollover
  • 27. Software Accreditation and Post-Implementation Activities
  • 28. Application Controls
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 32221
    حجم: 5139 مگابایت
    مدت زمان: 898 دقیقه
    تاریخ انتشار: ۶ فروردین ۱۴۰۳
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید